List of cybercriminals explained

Convicted computer criminals are people who are caught and convicted of computer crimes such as breaking into computers or computer networks. Computer crime can be broadly defined as criminal activity involving information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (or identity theft) and electronic fraud.[1]

In the infancy of the hacker subculture and the computer underground,[2] criminal convictions were rare because there was an informal code of ethics that was followed by white hat hackers.[3] Proponents of hacking claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them.[4] White hat hackers break past computer security for non-malicious reasons and do no damage, akin to breaking into a house and looking around.[5] They enjoy learning and working with computer systems, and by this experience gain a deeper understanding of electronic security.[5] As the computer industry matured, individuals with malicious intentions (black hats) would emerge to exploit computer systems for their own personal profit.[5]

Convictions of computer crimes, or hacking, began as early as 1984 with the case of The 414s from the 414 area code in Milwaukee. In that case, six teenagers broke into a number of high-profile computer systems, including Los Alamos National Laboratory, Sloan-Kettering Cancer Center and Security Pacific Bank. On May 1, 1984, one of the 414s, Gerald Wondra, was sentenced to two years of probation.[6] In May, 1986, the first computer trespass conviction to result in a jail sentence was handed down to Michael Princeton Wilkerson, who received two weeks in jail for his infiltration of Microsoft, Sundstrand Corp., Kenworth Truck Co. and Resources Conservation Co.[7]

In 2006, a prison term of nearly five years was handed down to Jeanson James Ancheta, who created hundreds of zombie computers to do his bidding via giant bot networks or botnets.[8] He then sold the botnets to the highest bidder who in turn used them for Denial-of-service (DoS) attacks.

, the longest sentence for computer crimes is that of Albert Gonzalez for 20 years.[9] The next longest sentences are those of 13 years for Max Butler,[10] 108 months for Brian Salcedo in 2004 and upheld in 2006 by the U.S. 4th Circuit Court of Appeals,[11] [12] and 68 months for Kevin Mitnick in 1999.[13]

Computer criminals

width=14% Namewidth=7% Handlewidth=10% NationalityConviction(s)width=11% data-sort-type=date Sentencing date(s)Penalty
Conor Brian FitzpatrickPompompurinUnited StatesConspiracy to commit access device fraud, access device fraud, and possession of child pornography.January 202420 years of supervised release
Michael Princeton WilkersonThe SprinterUnited StatesFour counts of Illegal Computer Trespass to computers at: Microsoft, Sundstrand Data Control, Kenworth Truck Co. and Resources Conservation Co. (a Boeing subsidiary)[14] 7 May 1986Two weeks jail sentence, 200 hours community service, Two years probation, Fined US$2,000[15]
Phiber OptikUnited StatesMisdemeanor theft-of-service for a free-call scam to a 900 number[16] data-sort-value="1 Jan 1991"199135 hours of community service
One count of computer trespass and one count of computer conspiracy[17] data-sort-value="1 Jan 1993"1993One-year jail sentence[18]
Ross Ulbrichtaltoid/frosty/Dread Pirate RobertsUnited Statesmoney laundering, conspiracy to commit computer hacking, and conspiracy to traffic narcoticsMay 29, 2015double life imprisonment plus forty years, without the possibility of parole.
GoboUnited StatesPleaded guilty to four federal charges of violating United States Code Section 1030, Fraud and Related Activity in Connection with Computers, specifically subsections (a)(5)(A)(i), 1030 (a)(5)(B)(i) and 1030(b)[19] 8 May 200657 months in prison, forfeit a 1993 BMW and more than US$58,000 in profit
Restitution of US$15,000 to the U.S. federal government for infecting military computers[20] [21]
Mendax / profffAustralia31 charges of hacking and related charges. Pleaded guilty to 25 charges, the remaining 6 were dropped.[22] 5 December 1996A recorded conviction on all counts, a reparation payment of A$2,100 to ANU (to be paid in 3 months time) and a A$5,000 good-behaviour bond.[23]
WeevUnited States (at time of sentencing)On November 20, 2012, was found guilty of one count of identity fraud and one count of conspiracy to access a computer without authorization.[24] 20 November 2012Auernheimer was sentenced to 41 months in federal prison and ordered to pay $73,000 in restitution.[25]
Hamza BendelladjBx1AlgeriaPleaded guilty to one count of conspiring to commit wire and bank fraud, 10 counts of wire fraud, one count of conspiring to commit computer fraud and abuse, and 11 counts of computer fraud and abuse[26] He is a co-creator of Trojan horse SpyEye. He stole from 217 American banks in total stealing $400 million and is alleged to have donated all the money to Africa and Palestine, though Trial documents did not mention any donations or charity activities.[27] Despite much false information on the internet Bendelladj did not get sentenced to death, and claims saying he donated any money to charity is almost impossible to verify.[28] The SpyEye software was also sold to other hackers and used as part of a botnet.23 April 201615 years jail sentence
United StatesConspiracy to steal credit card numbers from the Lowe's chain of home improvement stores[29] 16 December 2004Two years and two months imprisonment, followed by two years of supervised release[30]
MafiaBoyCanadaPleaded guilty to 56 charges of "mischief to data"[31] [32] 12 September 2001Eight months "open custody", by the Montreal Youth Court, one year of probation, restricted use of the Internet and a small fine[33]
Terri DiSistoUnited StatesFound guilty of email bombings which caused service outages at a number of colleges and universities; victims were young males from whom he solicited tickling videos who had stopped co-operating with his requests[34] data-sort-value="1 Jan 2001"2001Fined $5,000 (USD) and sentenced to six months in federal prison[35] [36]
PhoenixAustralia15 charges including trespassing on the University of Texas computer network, altering data at NASA and the theft of the ZARDOZ filedata-sort-value="1 Jan 1993"1993One-year suspended sentence: A$1,000 good-behaviour bond and 500 hours community service[37]
CuradorUnited KingdomPleaded guilty to theft and hacking offenses which fall under the Computer Misuse Act and six charges of intentionally accessing sites containing credit card details and using this information for financial gain[38] 6 July 2001Three years of psychiatric treatment after evidence emerged that he was suffering from a mental condition which needed medical treatment rather than incarceration[39]
MagicFXUnited StatesAdmitted the hacking and pleaded guilty to two felonies in 2004.[40] data-sort-value="1 Jan 2004"2004Sentenced to Time Served after spending 7 months in prison.
Markus HessGermanyFound guilty of espionage February 15, 1990one to two years suspended sentence
c0mradeUnited StatesTwo counts of juvenile delinquency21 September 2000Six-month prison sentence and probation until the age of eighteen[41]
ElectronAustraliaTrespassing on the University of Texas computer network and theft of the ZARDOZ filedata-sort-value="1 Jan 1993"1993One year and six months suspended sentence, 300 hours of community service and psychiatric assessment and treatment
samyUnited StatesPleaded guilty to violating California Penal Code 502(c)(8) for creating the "Samy is my hero" XSS worm that spread across the MySpace social networking site[42] data-sort-value="1 Jan 2007"2007Three years of formal probation, 90 days of community service, restitution paid to MySpace, restrictions on computer use
cam0United StatesPleaded guilty to hacking into the cell-phone account of celebrity Paris Hilton and participated in an attack on data-collection firm LexisNexis Group that exposed personal records of more than 300,000 consumers[43] 13 September 200511 months in a Massachusetts juvenile detention facility
United StatesOne-count of computer crimes against Microsoft, LexisNexis and The New York Times15 July 2004Six months detention at his parents' home plus two years probation and roughly US$65,000 in restitution[44]
sl1nkUnited KingdomPleaded guilty to five counts of "unauthorised acts with intent to impair operation of or prevent/hinder access to a computer", two of "unauthorised computer access with intent to commit other offences", one of "unauthorised computer access with intent to commit other offences", and one of "unauthorised access to computer material".
Hacking attempt on the websites of Kent Police, Cambridge University and Oxford University. Former member of NullCrew and said to have penetrated the servers of Department of Defense (DoD), Pentagon, NASA, NSA, other UK government websites.[45]
16 May 2013Two years imprisonment[46]
SoloUnited KingdomAccused in 2002 of perpetrating the "biggest military computer hack of all time," although McKinnon himself states that he was merely looking for evidence of free energy suppression and a cover-up of UFO activity and other technologies potentially useful to the public.data-sort-value="1 Jan 2002"2002On 16 October 2012, after a series of legal proceedings in Britain, Home Secretary Theresa May withdrew her extradition order to the United States.
CondorUnited StatesFour counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication9 August 199946 months in federal prison and US$4,125 in restitution[47]
CoolioUnited StatesMisdemeanor charges of hacking9 March 2001Nine months in jail and US$5,000 in restitution to each victim[48]
rtmUnited StatesIntentional access of federal interest computers without authorization thereby preventing authorized access and causing a loss in excess of US$1,000[49] 7 March 1991Three years probation and 400 hours of community service in a manner determined by the Probation Office and approved by the Court
T33kidUnited StatesPleaded guilty on August 11, 2004, to one count of intentionally causing or attempting to cause damage to a protected computer via his version of the Blaster computer worm[50] 28 January 200518 months in prison and 100 hours of community service[51]
The Black BaronUnited KingdomWriting and distributing computer virusesdata-sort-value="1 Jan 1995"199518 months in prison
Dark DanteUnited StatesPleaded guilty to seven counts of mail, wire and computer fraud, money laundering and obstruction of justice10 April 1995 51 months in prison and ordered to pay US$56,000 in restitution
TerminusUnited StatesIllicit use of proprietary software (UNIX 3.2 code) owned by AT&T and 2 counts of computer fraud and three counts of interstate transportation of stolen property.[52] [53] 12 June 1991One-year jail sentence[54]
David SchrootenFortezza / XakepNetherlandsAccused of causing 63 million dollar in damages. Primarily for his role in trafficking creditcards he obtained by hacking other hackers.[55] [56] Pleaded guilty to Conspiracy to Commit Access Device Fraud and Bank Fraud, Access Device Fraud, Bank Fraud, Intentional Damage to a Protected Computer, and Aggravated Identity Theft. 1 February 2013Extradited from Romania and sentenced to 144 months in U.S. federal prison.[57]
Track2RussianConvicted of 38 counts involving unauthorized access of business information systems and stealing over two million credit card numbers. Pleaded guilty to conspiracy to commit bank fraud.data-sort-value="1 Aug 2016"August 2016 and September 2017Sentenced to 27 years' imprisonment for the 2016 conviction,[58] [59] concurrent with sentence of 14 years for the second set of charges.[60]
KwyjiboUnited StatesPleaded guilty to knowingly spreading a computer virus, the Melissa virus, with the intent to cause damage1 May 200220 months in federal prison, US$5,000 fine and 100 hours of community service upon release[61]
RussiaAccused of using Zeus Trojan horse to attack thousands of bank accounts and opened at least five accounts in Bank of America and Wachovia.[62] It is estimated that with nine other people Svechinskaya had skimmed $3 million in total.[63] 24 June 2013Signed a personal recognizance bond[64] and was released under $25,000 bail.[65] Ordered to pay $35,000 in damages.[66]
AnalyzerIsraelAdmitted to cracking US and Israeli computers, and pleaded guilty to conspiracy, wrongful infiltration of computerized material, disruption of computer use and destroying evidence[67] 15 June 2001Six months of community service, one year of probation, a two-year suspended prison sentence and fined about US$18,000
GigabyteBelgiumWrote the Coconut-A, Sahay-A, and Sharp-A (first virus written in C#) computer viruses. Charged and arrested for computer data sabotage against internet security firm Sophos.[68] 16 February 2004Released within 24 hours on bail due to being a minor (17 years old).[69]
OnTheFlyNetherlandsSpreading data into a computer network with the intention of causing damage as the creator of the Anna Kournikova virus[70] 27 September 2001150 hours community service[71] [72]
The 414sUnited StatesUnauthorized access to computers at the Sloan-Kettering Cancer Center in New York and a Los Angeles bank[73] and two counts of "making harassing telephone calls"[74] 1 May 1983Two years probation
Tyler King-United StatesConspiring to commit computer fraud, computer fraud, and two counts of aggravated identity theft[75] 201957 months federal prison[76] [77]

See also

External links

Notes and References

  1. Book: Paul Taylor. Hackers: Crime in the Digital Sublime. 1999. November 3, 1999. 200. Routledge
    1 edition
    . 0-415-18072-4.
  2. Web site: 2009. The electronic discourse of the computer underground. Florida International University. May 10, 2009. Steve Mizrach. Gordon Meyer, a sociologist who has since left academia but continues to be involved in the computer industry (and to publish the Computer Underground Digest), wrote in his seminal paper The Social Organization of the Computer Underground that the "computer underground consists of actors in three roles – computer hackers, phone phreaks, and software pirates.".
  3. Web site: 2001. Interview with Chris Davis. Public Broadcasting Service. May 9, 2009.
  4. News: May 29, 1999. FBI'S web site socked as hackers target feds. New York Post. May 8, 2009. Brian Blomquist.
  5. April 2, 2001. Hacker Speak. PC World. May 10, 2009. Andrew Brandt. dead. https://web.archive.org/web/20090501230046/http://www.pcworld.com/article/44370/hacker_speak.html. May 1, 2009.
  6. News: May 1, 1984. Computer User Sentenced. The New York Times. September 11, 2008.
  7. News: Emery. Julie. 7 May 1986. Light jail term for young hacker. The Seattle Times.
  8. pg 26—Book: Richard Gissel. Digital Underworld. 2005. August 23, 2005. 222. Lulu. 1-4116-4423-9.
  9. March 25, 2010. TJX Hacker Gets 20 Years in Prison. Wired. January 22, 2012. Kim. Zetter.
  10. February 12, 2010. Record 13-Year Sentence for Hacker Max Vision. Wired. January 22, 2012. Kevin. Poulsen.
  11. Web site: December 15, 2004. Hacker Sentenced to Prison for Breaking into Lowe's Companies' Computers with Intent to Steal Credit Card Information. cybercrime.gov. January 22, 2012. dead. https://web.archive.org/web/20111130184340/http://www.cybercrime.gov/salcedoSent.htm. November 30, 2011.
  12. July 11, 2006. Crazy-Long Hacker Sentence Upheld. Wired. January 22, 2012.
  13. Web site: August 9, 1999 . Kevin Mitnick Sentenced to Nearly Four Years in Prison . cybercrime.gov . January 22, 2012 . dead . https://web.archive.org/web/20111219065458/http://www.cybercrime.gov/mitnick.htm . December 19, 2011 .
  14. News: Julie. Emery. 7 May 1986. Light jail term for young hacker. The Seattle Times.
  15. News: Hopkins. Jack. 7 May 1986. Computer intruder gets 2 weeks in jail. The Seattle Post Intelligencer.
  16. Book: Bruce Sterling. Bruce Sterling. The Hacker Crackdown—Law and Disorder on the Electronic Frontier. January 1994. Project Gutenberg. 0-553-56370-X. 336. 1993.
  17. April 1994. Phiber Optik Goes to Prison—Issue 2.04. Wired. August 23, 2008.
  18. Web site: June 23, 2009. Q&A: Mark Abene, from 'Phiber Optik' to security guru. CNET Networks. June 28, 2009. Elinor Mills. August 5, 2009. https://web.archive.org/web/20090805181115/http://news.cnet.com/8301-1009_3-10270582-83.html. dead.
  19. Web site: January 27, 2006. Cybercrime does pay; here's how. CNET Reviews. September 11, 2008. Robert Vamosi.
  20. News: January 24, 2006. American owns up to hijacking PCs. BBC News. June 22, 2009 .
  21. Web site: May 8, 2006 . "Botherder" Dealt Record Prison Sentence for Selling and Spreading Malicious Computer Code . . June 22, 2009 . Debra Wong Chang - United States Attorney . dead . https://web.archive.org/web/20090531145557/http://www.usdoj.gov/criminal/cybercrime/anchetaSent.htm . May 31, 2009 .
  22. Book: Dreyfus, Suelette. Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier. 1997. 48–49. 2011-09-13. 2011-05-21. https://web.archive.org/web/20110521071725/http://www.xs4all.nl/~suelette/underground/Underground.pdf. dead.
  23. Book: Dreyfus, Suelette . Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier . 1997 . 48–49 . dead . https://web.archive.org/web/20120821044405/http://suelette.home.xs4all.nl/underground/Underground.pdf . 2012-08-21 .
  24. Web site: Hacker Found Guilty of Breaching AT&T Site to Obtain iPad Customer Data . Threat Level . Wired . Zetter . Kim . November 20, 2012 . February 15, 2018.
  25. iPad Hack Statement Of Responsibility . January 23, 2013 . February 15, 2018. Kim. Zetter. Wired.
  26. Web site: Hacker Hamza Bendelladj sentenced to 15 years. en-us. 2016-05-23.
  27. Web site: Hamza Bendelladj: Is the Algerian hacker a hero? | News. Al Jazeera. 2018-05-24.
  28. http://www.standaard.be/cnt/dmf20150922_01880674 Algerijnse hacker star van amerikanen en schonk aan palestijnen
  29. Web site: 2009 . Michigan Wi-Fi hacker jailed for nine years. The Register. June 22, 2009 . Kevin Poulsen . Kevin Poulsen .
  30. Web site: December 16, 2004. Judgement in a Criminal Case, 5:03CR53-02, Western District of North Carolina. timmins. August 23, 2008.
  31. February 7, 2007. February 7, 2000: Mafiaboy's Moment. Wired. May 23, 2009. Tony Long.
  32. Web site: September 13, 2001. Mafiaboy given eight months. The Register. May 23, 2009.
  33. Web site: April 2003. FBI Facts and Figure 2003. Federal Bureau of Investigation. March 27, 2007. https://web.archive.org/web/20070326115414/http://www.fbi.gov/libref/factsfigure/factsfiguresapri2003.htm . March 26, 2007.
  34. News: Scoblionkov. Deborah. Who's Laughing Now?. mycitypaper.com. Philadelphia City Paper. 5 April 2001. en.
  35. Web site: Rizza . Joe . Who Was Educating Your Children? . Antonnews.com . 2013-05-02 . dead . https://web.archive.org/web/20130808072852/http://www.antonnews.com/threevillagetimes/2001/04/13/news/ . 2013-08-08 .
  36. Book: McWilliams, Brian . Spam Kings: The Real Story behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements . . 2004 . 978-0-596-00732-4 . registration .
  37. News: May 25, 2003. Hack to the future. The Age. August 23, 2008. Melbourne.
  38. Web site: July 6, 2001. 'Bill Gates' hacker escapes jail. The Register. September 11, 2008. John Leyden.
  39. News: July 6, 2001. Teen hacker escapes jail sentence. BBC News. September 11, 2008.
  40. April 6, 2007. Court Okays Counter-Hack of eBay Hacker's Computer. Wired News. April 21, 2010 . Poulsen . Kevin . Kevin Poulsen .
  41. Book: Michael Newton. The Encyclopedia of High-Tech Crime and Crime-Fighting. Checkmark Books, an imprint of Facts on File Inc.. 0-8160-4978-5. November 2003. 416. 2004. registration.
  42. Web site: January 31, 2007. MySpace speaks about Samy Kamkar's sentencing. TechSpot. December 27, 2010.
  43. News: February 27, 2007. They'll Always Have Paris. The Washington Post. May 9, 2009. Brian Krebs.
  44. Web site: July 15, 2004. Hacker Lamo Sentenced To Home Detention. Information Week. United Business Media, Inc. August 23, 2008. George V. Hulme. January 22, 2009. https://web.archive.org/web/20090122212509/http://www.informationweek.com/news/security/showArticle.jhtml?articleID=23901163. dead.
  45. Is Department of Defense (DoD), Pentagon, NASA, NSA secure?, TheHackerNews, May 14, 2011.
  46. Man jailed for attempting to compromise websites, Kent Police, United Kingdom, 16 May 2013.
  47. Web site: August 9, 1999. Kevin Mitnick sentenced to nearly four years in prison. United States Department of Justice. August 23, 2008. dead. https://web.archive.org/web/20090926231348/http://www.usdoj.gov/criminal/cybercrime/mitnick.htm. September 26, 2009.
  48. News: February 6, 2002 . Hacker sentenced, must program jail computers. USA Today. August 23, 2008. Associated Press.
  49. Web site: August 14, 2002. Judgment in U.S. v. Robert Tappan Morris. rbs2. August 23, 2008. Ronald B. Standler.
  50. Web site: August 12, 2004. Teen Pleds Guilty in Blaster Worm Attack. CRN Magazine. May 11, 2009. https://web.archive.org/web/20110606223442/http://www.crn.com/news/security/28700075/teen-pleads-guilty-in-blaster-worm-attack.htm. 2011-06-06. dead.
  51. Web site: January 28, 2005. Blaster-B worm author sentenced to 18 months in jail - but bigger villain remains free, Sophos reports. Sophos Plc. May 11, 2009. https://web.archive.org/web/20090819072439/http://www.sophos.com/pressoffice/news/articles/2005/01/va_parsonsentence.html. August 19, 2009. dead.
  52. News: Henry Weinstein. Hacker Enters Guilty Plea in Theft of Computer Data. Los Angeles Times. Business; PART-D; Financial Desk. 2. March 23, 1991. May 9, 2009. October 20, 2012. https://web.archive.org/web/20121020131835/http://pqasb.pqarchiver.com/latimes/access/61150772.html?dids=61150772:61150772&FMT=ABS&FMTS=ABS:FT&type=current&date=Mar+23,+1991&author=HENRY+WEINSTEIN&pub=Los+Angeles+Times+(pre-1997+Fulltext)&edition=&startpage=2&desc=Hacker+Enters+Guilty+Plea+in+Theft+of+Computer+Data. dead.
  53. Web site: March 27, 1991. Legion of Doom's "Terminus" sentenced. RISKS Digest. May 9, 2009. Rodney Hoffman.
  54. Web site: March 31, 1991. Correction Re: Terminus. RISKS Digest. May 9, 2009. Rodney Hoffman. Under the plea agreements, ... Rose ... will serve a year in prison..
  55. Web site: Feds Arrest 'Kurupt' Carding Kingpin? – Krebs on Security. 2021-08-01. en-US.
  56. Web site: Study for an Impact Assessment on a Proposal for a New Legal Framework on Identity Theft - European Commission (Fortezza mentioned as example).
  57. Web site: 2015-03-09. Dutch Citizen Sentenced to 12 Years in Prison for Computer Hacking Scheme that Stole and Sold Credit Card Info. 2021-08-01. www.justice.gov. en.
  58. Web site: Russian Cyber-Criminal Sentenced to 27 Years in Prison for Hacking and Credit Card Fraud Scheme.
  59. Web site: Russian Hacker Sentenced to 27 Years in Credit Card Case. Nicole. Perlroth. 21 April 2017. 21 May 2017. NYTimes.com.
  60. November 30, 2017 . Russian Cyber-Criminal Sentenced to 14 Years in Prison for Role in Organized Cybercrime Ring Responsible for $50 Million in Online Identity Theft and $9 Million Bank Fraud Conspiracy . Washington, D.C. . U.S. Department of Justice . 2018-05-26.
  61. Web site: May 1, 2002 . Creator of Melissa Computer Virus Sentenced to 20 Months in Federal Prison . . May 11, 2009 . dead . https://web.archive.org/web/20060820090416/http://www.usdoj.gov/criminal/cybercrime/melissaSent.htm . August 20, 2006 .
  62. Web site: http://www.bbc.co.uk/russian/international/2010/10/101003_case_zeus_svechinskaya.shtml. ru:В деле о хакерах таблоиды США нашли вторую Чэпман. BBC Russian Service. Владимир. Козловский. 2010-11-02. ru.
  63. News: Kristina Svechinskaya: Accused Russian Hacker. CBS News. 2010-11-02.
  64. Web site: http://www.rian.ru/world/20101203/304047673.html. ru:Россиянку, подозреваемую в США в мошенничестве, отпустят под залог. RIA Novosti. 2010-12-04. ru.
  65. Web site: http://www.itsec.ru/newstext.php?news_id=75019&format=printer-friendly. ru:Суд над арестованными в США по обвинению в кибермошенничестве российскими студентами завершится в ближайшие месяцы. Information Security. 2011-11-26. ru.
  66. News: US court frees "world's sexiest computer hacker" prosecuted for bank fraud. 31 July 2017. RAPSI. 24 June 2013.
  67. Web site: June 15, 2001. Solar Sunrise hacker 'Analyzer' escapes jail. The Register. September 11, 2008. Kevin Poulsen. Kevin Poulsen.
  68. Book: Holt. Thomas J.. Schell. Bernadette H.. Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications. 2011. Business Science Reference. Hershey, PA. 9781616928056. 146.
  69. Web site: Female virus-writer, Gigabyte, arrested in Belgium, Sophos comments. Sophos. 9 August 2017. 16 February 2004.
  70. Web site: September 27, 2001. Kournikova virus kiddie gets 150 hours community service. The Register. May 10, 2009. Robert Blincoe.
  71. Web site: September 14, 2001. Anna Kournikova virus author stands trial. The Register. June 22, 2009 . John Leyden .
  72. September 28, 2001. Kournikova Virus Writer Found Guilty. https://archive.today/20130131025336/http://www.pcworld.com/article/63746/kournikova_virus_writer_found_guilty.html. dead. January 31, 2013. PC World. May 23, 2009. Joris Evers.
  73. News: May 1, 1983. Computer User Sentenced. The New York Times. September 11, 2008.
  74. News: March 17, 1984. Two who raided computers pleading guilty—Late City Final Edition, Section 1, Page 6, Column 1, 383 words. The New York Times. May 9, 2009.
  75. Web site: 2019-11-12 . Jury Convicts Texas Man of Computer Fraud, Aggravated Identity Theft . 2022-04-30 . www.justice.gov . en.
  76. Web site: 2020-08-13 . Texas Man Sentenced to 57 Months for Computer Hacking and Aggravated Identity Theft . 2022-04-30 . www.justice.gov . en.
  77. Web site: Texas Man Sentenced to 57 Months in Prison for Hacking Major Tech Firm SecurityWeek.Com . 2022-04-30 . www.securityweek.com.